diff options
author | Armin Kuster <akuster@mvista.com> | 2016-02-28 10:53:34 -0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2016-03-21 15:48:29 +0000 |
commit | 1916b4c34ee9d752c12b8311cb9fd41e09b82900 (patch) | |
tree | 8bfcb1fa8111f94600b44804a53e4d9e32cc0481 /meta/recipes-connectivity/wpa-supplicant/wpa-supplicant-1.0.inc | |
parent | 01e9f306e0af4ea2d9fe611c1592b0f19d83f487 (diff) | |
download | openembedded-core-1916b4c34ee9d752c12b8311cb9fd41e09b82900.tar.gz openembedded-core-1916b4c34ee9d752c12b8311cb9fd41e09b82900.tar.bz2 openembedded-core-1916b4c34ee9d752c12b8311cb9fd41e09b82900.zip |
glibc: CVE-2015-9761
A stack overflow vulnerability was found in nan* functions that could cause
applications which process long strings with the nan function to crash or,
potentially, execute arbitrary code.
(From OE-Core rev: fd3da8178c8c06b549dbc19ecec40e98ab934d49)
Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-connectivity/wpa-supplicant/wpa-supplicant-1.0.inc')
0 files changed, 0 insertions, 0 deletions